PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:26976
vulners.com/securityvulns/securityvulns:doc:26977
vulners.com/securityvulns/securityvulns:doc:26978
vulners.com/securityvulns/securityvulns:doc:26979
vulners.com/securityvulns/securityvulns:doc:26980
vulners.com/securityvulns/securityvulns:doc:26982
vulners.com/securityvulns/securityvulns:doc:26983
vulners.com/securityvulns/securityvulns:doc:26984
vulners.com/securityvulns/securityvulns:doc:26985
vulners.com/securityvulns/securityvulns:doc:26986
vulners.com/securityvulns/securityvulns:doc:26987
vulners.com/securityvulns/securityvulns:doc:26988
vulners.com/securityvulns/securityvulns:doc:26989
vulners.com/securityvulns/securityvulns:doc:26990
vulners.com/securityvulns/securityvulns:doc:26991
vulners.com/securityvulns/securityvulns:doc:26992
vulners.com/securityvulns/securityvulns:doc:26993
vulners.com/securityvulns/securityvulns:doc:26994